problem1. Illustrate the following security services: Confidentiality, Availability.
problem2. Describe the term “Known Plaintext” attack?
problem3. What do you understand by the phrases “Playback”, “Spoofing”?
problem4. Make a distinction between unconditional security and computational security.
problem5. Describe two limitations of steganography.
problem6. Describe the operation of Trojan horse program. How can we protect our computer from such a program?